CoMSES Net maintains cyberinfrastructure to foster FAIR data principles for access to and (re)use of computational models. Model authors can publish their model code in the Computational Model Library with documentation, metadata, and data dependencies and support these FAIR data principles as well as best practices for software citation. Model authors can also request that their model code be peer reviewed to receive a DOI. All users of models published in the library must cite model authors when they use and benefit from their code.
CoMSES Net also maintains a curated database of over 7500 publications of agent-based and individual based models with additional metadata on availability of code and bibliometric information on the landscape of ABM/IBM publications that we welcome you to explore.
The Urban Traffic Simulator is an agent-based model developed in the Unity platform. The model allows the user to simulate several autonomous vehicles (AVs) and tune granular parameters such as vehicle downforce, adherence to speed limits, top speed in mph and mass. The model allows researchers to tune these parameters, run the simulator for a given period and export data from the model for analysis (an example is provided in Jupyter Notebook).
The data the model is currently able to output are the following:
Cooperation is essential for all domains of life. Ironically, it is intrinsically vulnerable to exploitation by cheats. Hence, there is an explanatory necessity that triggers a lot of evolutionary biologists to search for mechanisms that could support cooperation. In general, cooperation can emerge and be maintained when cooperators are sufficiently interacting with themself to provide a kind of assortment and reciprocity. One of the most crucial and common mechanisms to achieve that task are kin selection, spatial structure, and enforcement (punishment). Here I used agent-based simulation models to investigate these pivotal mechanisms against conditional defector strategies and concluded it could easily violate all of them and take over the population. This surprising outcome may cue us to rethink the evolution of cooperation as it illustrates that maintaining cooperation may be more difficult than previously thought. Moreover, besides the theoretical findings, there are empirical applications such as invading the cooperator population of pathogens by genetically engineered conditional defectors, which could be a potential therapy for many incurable diseases.
ViSA simulates the decision behaviors of different stakeholders showing demands for ecosystem services (ESS) in agricultural landscape. The lack of sufficient supply of ESSs triggers stakeholders to apply different management options to increase their supply. However, while attempting to reduce the supply-demand gap, conflicts arise among stakeholders due to the tradeoff nature of some ESS. ViSA investigates conditions and scenarios that can minimize such supply-demand gap while reducing the risk of conflicts by suggesting different mixes of management options and decision rules.
The model reproduces the spread of environmental awareness among agents and the impact of awareness level of the agents on the consumption of a resource, like energy. An agent is a household with a set of available advanced smart metering functions.
The western honey bee Apis mellifera is the most important pollinator in the world. The biggest threat to managed honey bees is the ectoparasitic mite Varroa destructor and the viruses DWV (Deformed Wing Virus) and APV (Acute Paralysis Virus) it transmits. Untreated honey bee colonies are expected to die within one to three years. This led to the development of strategies for beekeepers to control the Varroa mite in honey bee colonies and ensure the health and survival of their bee colonies, so called Good Beekeeping Practice. The aim of the extension of BEEHAVE was to represent the Good Beekeeping Practice of Varroa control in Germany. The relevant measures within the Varroa control strategies are drone brood removal as a Varroa trap and the treatment of bee colonies with organic acaricides (formic and oxalic acid) to kill the mites. This extension improves BEEHAVE and builds a bridge between beekeepers in practice and in the modelling world. It vastly contributes to the future use of BEEHAVE in beekeeping education in Germany.
FIBE represents a simple fishery model. Fish that reproduce and fisher with different fishing styles that fish as their main source of income. The aim of the model is to reflect the different fishing behaviours as described and observed in the (Swedish) Baltic Sea fishery and explore the consequences of different approximations of human/fisher behaviour in under different environmental and managerial scenarios.
The overarching aim is to advance the incorporation and understanding of human behaviour (diversity) in fisheries research and management. In particular focusing on insights from social (fishery) science of fisher behaviour.
This model simulates the propagation of photons in a water tank. A source of light emits an impulse of photons with equal energy represented by yellow dots. These photons are then scattered by water particles before possibly reaching the photo-detector represented by a gray line. Different types of water are considered. For each one of them we calculate the total received energy.
The water tank is represented by a blue rectangle with fixed dimensions. It’s exposed to the air interface and has totally absorbent barriers. Four types of water are supported. Each one is characterized by its absorption and scattering coefficients.
At the source, the photons are generated uniformly with a random direction within the beamwidth. Each photon travels a random distance drawn from a distribution depending on the water characteristics before encountering a water particle.
Based on the updated position of the photon, three situations may occur:
-The photon hits the barrier of the tank on its trajectory. In this case it’s considered as lost since the barriers are assumed totally absorbent.
The Friendship Field model aims at modelling friendship formation based on three factors: Extraversion, Resemblance and Status, where social interaction is motivated by the Social Battery. Social Battery is one’s energy and motivation to engage in social contact. Since social contact is crucial for friendship formation, the model included Social Battery to affect social interactions. To our best knowledge, Social Battery is a yet unintroduced concept in research while it is a dynamic factor influencing the social interaction besides one’s characteristics. Extraverts’ Social Batteries charge while interacting and exhaust while being alone. Introverts’ Social Batteries charge while being alone and exhaust while interacting. The aim of the model is to illustrate the concept of Social Battery. Moreover, the Friendship Field shows patterns regarding Extraversion, Resemblance and Status including the mere-exposure effect and friendship by similarity. For the implementation of Status, Kemper’s status-power theory is used. The concept of Social Battery is also linked to Kemper’s theory on the organism as reference group. By running the model for a year (3 interactions moments per day), the friendship dynamics over time can be studied.
Cultural group selection model used to evaluate the conditions for agents to evolve who have other-regarding preferences in making decisions in public good games.
ICARUS is a multi-agent compliance inspection model (ICARUS - Inspecting Compliance to mAny RUleS). The model is applicable to environments where an inspection agency, via centrally coordinated inspections, examines compliance in organizations which must comply with multiple provisions (rules). The model (ICARUS) contains 3 types of agents: entities, inspection agency and inspectors / inspections. ICARUS describes a repeated, simultaneous, non-cooperative game of pure competition. Agents have imperfect, incomplete, asymmetric information. Entities in each move (tick) choose a pure strategy (comply/violate) for each rule, depending on their own subjective assessment of the probability of the inspection. The Inspection Agency carries out the given inspection strategy.
A more detailed description of the model is available in the .nlogo file.
Full description of the model (in line with the ODD+D protocol) and the analysis of the model (including verification, validation and sensitivity analysis) can be found in the attached documentation.